Re: Which header check & reject method to use?

2017-07-24 Thread /dev/rob0
On Mon, Jul 24, 2017 at 02:27:16PM -0700, robg...@nospammail.net wrote: > I'm getting Postfix setup to deal with "bad headers". > > Looks like there's a bunch of ways to do it. > > Three I'm looking at are > > 1) Postfix's built in headers check > 2) A milter that'll check for & reject headers >

Re: Which header check & reject method to use?

2017-07-24 Thread robgane
Hi On Mon, Jul 24, 2017, at 02:47 PM, Noel Jones wrote: > Use whichever you like. For simple checks, the differences are > probably not significant. For complex checks (eg. checking multiple > conditions or whitelisting certain messages) you'll need to use a > milter or amavisd. Ok, I didn't ca

Re: Which header check & reject method to use?

2017-07-24 Thread Noel Jones
On 7/24/2017 4:27 PM, robg...@nospammail.net wrote: > Hi > > I'm getting Postfix setup to deal with "bad headers". > > Looks like there's a bunch of ways to do it. > > Three I'm looking at are > > 1) Postfix's built in headers check > 2) A milter that'll check for & reject headers > 3) Amavisd'

Which header check & reject method to use?

2017-07-24 Thread robgane
Hi I'm getting Postfix setup to deal with "bad headers". Looks like there's a bunch of ways to do it. Three I'm looking at are 1) Postfix's built in headers check 2) A milter that'll check for & reject headers 3) Amavisd's built in header handling I can actually get all three to work pretty mu

Re: Enforce TLS to MX

2017-07-24 Thread Viktor Dukhovni
On Mon, Jul 24, 2017 at 01:53:57PM -0400, Wietse Venema wrote: > post...@xmas.de: > > Hi, > > > > isn't it possible to enforce TLS outbound to an MX ? > > Sure there is. > > /etc/postfix/master.cf > smtp-encrypt .. .. .. .. .. .. smtp -o smtp_tls_security_level=encrypt > > /etc/postfix/tran

Re: Enforce TLS to MX

2017-07-24 Thread Wietse Venema
post...@xmas.de: > Hi, > > isn't it possible to enforce TLS outbound to an MX ? Sure there is. /etc/postfix/master.cf smtp-encrypt .. .. .. .. .. .. smtp -o smtp_tls_security_level=encrypt /etc/postfix/transport example.com smtp-encrypt /etc/postfix/main.cf transport_maps = hash:/e

Re: postscreen log summary

2017-07-24 Thread Mike
On 7/24/2017 12:12 PM, Scott Techlist wrote: > Anyone have or know of a log parser/tool that includes postscreen logs? I > don't think Jim's pflogsum includes any type of postscreen data. > > Would be nice to have some reporting that included how much I'm potentially > preventing vs. processing.

Re: Enforce TLS to MX

2017-07-24 Thread Viktor Dukhovni
On Mon, Jul 24, 2017 at 02:33:01PM +0200, post...@xmas.de wrote: > isn't it possible to enforce TLS outbound to an MX ? No, Postfix TLS policy is based on the locally (securely) determined nexthop domain, not the remotely (insecurely in most cases, given still sparse DNSSEC deployment) determmine

Re: Enforce TLS to MX

2017-07-24 Thread Noel Jones
On 7/24/2017 7:33 AM, post...@xmas.de wrote: > Hi, > > isn't it possible to enforce TLS outbound to an MX ? > In the example below, if mx0.example.com isn't offering TLS the > email is sent unencrypted !? > Enforcing TLS to a domain ist working as expected. > > tls_policy: > [mx0.example.com]

postscreen log summary

2017-07-24 Thread Scott Techlist
Anyone have or know of a log parser/tool that includes postscreen logs? I don't think Jim's pflogsum includes any type of postscreen data. Would be nice to have some reporting that included how much I'm potentially preventing vs. processing. Thanks, Scott

Re: Enforce TLS to MX

2017-07-24 Thread Paul Menzel
Dear anonymous, On 07/24/17 14:33, post...@xmas.de wrote: isn't it possible to enforce TLS outbound to an MX ? In the example below, if mx0.example.com isn't offering TLS the email is sent unencrypted !? Enforcing TLS to a domain ist working as expected. > tls_policy: [mx0.example.com]

Enforce TLS to MX

2017-07-24 Thread post...@xmas.de
Hi, isn't it possible to enforce TLS outbound to an MX ? In the example below, if mx0.example.com isn't offering TLS the email is sent unencrypted !? Enforcing TLS to a domain ist working as expected. tls_policy: [mx0.example.com] encrypt [4.3.2.1]encrypt postfix-3.2.0